This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies. It provides detailed insights into the unique security and privacy conce...Lasīt vairāk
The book presents theoretical and experimental approaches, quantitative and qualitative analysis, and simulations in wireless ad-hoc and sensor networks. It further explains the power, and routing optimization in underwater sensor networks, advanced...Lasīt vairāk
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor...Lasīt vairāk
The internet has gone from an internet of people, to an Internet of Things. This has brought forth strong levels of complexity in handling interoperability that involves the integrating of WSNs into IoT. The Internet has gon...Lasīt vairāk
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are...Lasīt vairāk
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor...Lasīt vairāk
The internet has gone from an internet of people, to an Internet of Things. This has brought forth strong levels of complexity in handling interoperability that involves the integrating of WSNs into IoT. This book offers insights on the evo...Lasīt vairāk
This book will focus on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It will include contributions that discuss the security and privacy issues as well as the opportunities and applications that...Lasīt vairāk
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way coope...Lasīt vairāk
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to d...Lasīt vairāk
K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque
(Izdošanas datums: 12-Jun-2020, Hardback, Izdevniecība: Business Science Reference, ISBN-13: 9781799850687)
This book explores the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques--...Lasīt vairāk
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of securit...Lasīt vairāk
Presents research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. The book features coverage on a broad range of topics, including clustering prot...Lasīt vairāk
This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020. The 8 full and 4 short papers presented in this...Lasīt vairāk
This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2019, held as part of SCF 2019, in San Diego, CA, USA, in June 2019. The 8 full and 3 short papers presented in this volume were carefu...Lasīt vairāk
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way coope...Lasīt vairāk
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN secu...Lasīt vairāk